default search action
Information Security Journal: A Global Perspective, Volume 21
Volume 21, Number 1, 2012
- Mohammad Fraiwan, Rami Al-Salman, Natheer Khasawneh, Stefan Conrad:
Analysis and Identification of Malicious JavaScript Code. 1-11 - Dimitrios A. Baltatzis, Christos Ilioudis, George Pangalos:
A Role Engineering Framework to Support Dynamic Authorizations in Collaborative Environments. 12-27 - Addepalli V. N. Krishna:
An Improvised ECC Mechanism with Probabilistic Approach. 28-35 - Uloli Thiruvaazhi, M. Edington Alex:
A Forensic Mechanism to Trace the Master of Distributed Denial-of-Service Attack. 36-46 - Jason S. Burkett:
Business Security Architecture: Weaving Information Security into Your Organization's Enterprise Architecture through SABSA®. 47-54 - Mohamed Ibrahiem Amer, Tarek S. Sobh, Gouda Ismail Mohamed:
Using Hash Table to Extract Real-Time Online Network Traffic Features for Hardware IDS. 55-63
Volume 21, Number 2, 2012
- P. Mohan Kumar, K. L. Shunmuganathan:
Developing a Secure Image Steganographic System Using TPVD Adaptive LSB Matching Revisited Algorithm for Maximizing the Embedding Rate. 65-70 - Kevin T. Smith:
Mitigating Risks Associated with Transitive Trust in Service-Based Identity Propagation. 71-78 - Kakali Chatterjee, Asok De, Daya Gupta:
Timestamp-Based Digital Envelope for Secure Communication Using HECC. 79-87 - Roli Bansal, Priti Sehgal, Punam Bedi:
Securing Fingerprint Images Using PSO-Based Wavelet Domain Watermarking. 88-101 - Jian Hua, Sanjay Bapna:
How Can We Deter Cyber Terrorism? 102-114
Volume 21, Number 3, 2012
- Kenneth Earl Gumm Jr.:
Can Social Network Analysis be Effective at Improving the Intelligence Community While Ensuring Civil Rights? 115-126 - Douglas Warfield:
Critical Infrastructures: IT Security and Threats from Private Sector Ownership. 127-136 - Oluwasefunmi 'Tale Arogundade, A. T. Akinwale, Zhi Jin, Xiaoguang Yang:
Towards an Ontological Approach to Information System Security and Safety Requirement Modeling and Reuse. 137-149 - S. A. Arunmozhi, Y. Venkataramani:
Black Hole Attack Detection and Performance Improvement in Mobile Ad-Hoc Network. 150-158 - David Bennett:
The Challenges Facing Computer Forensics Investigators in Obtaining Information from Mobile Devices for Use in Criminal Investigations. 159-168
Volume 21, Number 4, 2012
- Syed Akram, Mohammed Misbahuddin, G. Varaprasad:
A Usable and Secure Two-Factor Authentication Scheme. 169-182 - Sherali Zeadally, Byunggu Yu, Dong Hyun Jeong, Lily Rui Liang:
Detecting Insider Threats: Solutions and Trends. 183-192 - Ibrahim F. Elashry, Osama S. Faragallah, Alaa M. Abbas, S. El-Rabaie, Fathi E. Abd El-Samie:
A New Method for Encrypting Images with Few Details Using Rijndael and RC6 Block Ciphers in the Electronic Code Book Mode. 193-205 - Gerardo Canfora, Corrado Aaron Visaggio:
Managing Trust in Social Networks. 206-215 - Timothy Godlove:
Examination of the Factors that Influence Teleworkers' Willingness to Comply with Information Security Guidelines. 216-229
Volume 21, Number 5, 2012
- Ismail San, Nuray At:
Compact Keccak Hardware Architecture for Data Integrity and Authentication on FPGAs. 231-242 - T. N. Shankar, Gadadhar Sahoo, S. Niranjan:
Using the Digital Signature of a Fingerprint by an Elliptic Curve Cryptosystem for Enhanced Authentication. 243-255 - Lo'ai Ali Tawalbeh, Omar Banimelhem, Mohammed A. Al-Batati:
A Novel High Quality High Capacity Image Hiding Scheme Based on Image Compression and an Optical Pixel Adjustment Process. 256-268 - Henk-Jan van der Molen:
Forecasting Malware Conditions: Worsening Conditions, Some Bright Spots. 269-279 - Georgios Mamalakis, Chariton Karamitas:
A Unified User Management System. 280-284 - Osama S. Faragallah:
Quadruple Difference Expansion-Based Reversible Data Hiding Method for Digital Images. 285-295
Volume 21, Number 6, 2012
- Stefan G. Weber:
A Hybrid Attribute-Based Encryption Technique Supporting Expressive Policies and Dynamic Attributes. 297-305 - Osama Hayatle, Amr M. Youssef, Hadi Otrok:
Dempster-Shafer Evidence Combining for (Anti)-Honeypot Technologies. 306-316 - Vinay Kumar, Abhishek Bansal, Sunil Kumar Muttoo:
Hiding Information in Vector Layer While Extracting Layers from Raster Data. 317-327 - Konstantinos Rantos, Konstantinos Fysarakis, Charalampos Manifavas:
How Effective Is Your Security Awareness Program? An Evaluation Methodology. 328-345 - Chandrapal Chahar, Vishal Singh Chauhan, Manik Lal Das:
Code Analysis for Software and System Security Using Open Source Tools. 346-352
- Abubakr Magzoub:
Privacy and Big Data, by Craig, T., and Ludloff, M. E.Sebastopol, CA: O'Reilly Media, 2011, 91p. $14.99. ISBN: 978-1-449-30500-0. 353-354 - Larry Marks:
Blackjacking: Security Threats to Blackberry Devices, PDAs and Cell Phones in the Enterprise, by Hoffman, Daniel V.New York: Wiley, 2007, 292p., $39.99.ISBN 978-0-470-12754-4. 355-356
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.